Cyber Risk: Protecting Your Remote Business - April 16, 2020 - HUB ...
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Cyber Risk: Protecting Your Remote Business April 16, 2020 Advocacy. © 2020 HUB International Limited. 1 © 2020 HUB Tailored InternationalInsurance Limited. Solutions. Peace of Mind
Emily Selck Arturo Perez-Reyes Benjamin Auton Senior Vice President Senior Vice President Vice President Cyber Liability Practice Leader Cyber Liability Practice Leader Operations and Security Services Central and West Regions California, Nevada, and Utah SpearTip Cyber Counterintelligence HUB International HUB International 800-236-6550 312-279-4941 415-529-3478 BAuton@speartip.com emily.selck@hubinternational.com arturo.perez-reyes@hubinternational.com 2 2 © 2019 © 2020 HUB International HUB International Limited. Limited.
COVID-19: The Largest Cyber-threat Ever Work from home (WFH) has disrupted standard security Making possible new perils and threats Fear and concern makes COVID a lure Isolation creates many new needs Attacks coalesce on the opportunities 3 © 2020 HUB International Limited.
In the News o Phishing with COVID lures is up 667% COVID-19 Related Threats in Q1 2020 o Ecommerce fraud on N95 masks, 400% 907K o One week if Interpol: 2,000 online links advertising Total spam messages related to COVID-19 COVID items. Seizure of 34,000 counterfeit masks and “coronavirus medicine” 737 48K o Fake cure takedowns of Iron Man and Alex Jones Detected malware Hits on malicious URLs related to COVID-19 related to COVID-19 o Attacks on HC providers and personnel: HHS, IL, etc. 220K 260% o Payment-fraud campaigns regarding CARE-Act funds Increase in malicious Increase in spam from URL hits from Feb to o Chinese military’s APT 41 exploiting the crisis to attack Feb to Mar 2020 March 2020 businesses United States o US consumers have lost $5 million to coronavirus Top location for spam and malware detections, scams, according to the FTC and users accessing malicious URLs o 80% of all the attacks have something to do with the Detection numbers are based on coverage of our Smart Protection Network, which has limited global distribution (collection period January 1 to March 31, 2020 pandemic, says Proofpoint Source: Trend Micro | research 4 © 2020 HUB International Limited.
Agenda 1 Are WFH employees and computers covered for cyber protection? 2 What perils can cause disruption or losses? 3 How can firms secure themselves? 4 Questions and answers 5 5 © 2020 © 2020 HUBHUB International International Limited. Limited.
The Post COVID-19 Cyber World The attack surface of networks is completely different Networks have become completely distributed Network monitoring and log-based security don’t protect work from home networks Endpoint visibility and protection is ideal but not everyone has or can afford it 6 © 2020 HUB International Limited.
Risk Management 7 7 © 2020 HUB International Advocacy. Tailored Limited. Insurance Solutions. Peace of Mind
Risk-solution Stack • Outsource Avoid • IP Blacklists • Firewalls Prevent • Email filters • Intrusion detection Mitigate • Continuity plans • Contracts Transfer • Insurance 8 © 2020 HUB International Limited.
Insurance Privacy triggers Required Bring Your Own Device (BYOD) policy o Statutes and laws Privacy Breach: o Contracts: NDAs (a) the unauthorized collection, disclosure, use, access, destruction or modification of Private Information; (b) the inability to access or failure to provide Private Information; (c) the theft or loss of Private Information, including the theft or loss of Private Security triggers Information stored on an unsecured Data storage device or mobile or handheld device, including any smartphone, tablet or laptop o Your computers and network which is owned by You and operated by an Insured, or owned and o Your leased cycles and wares operated by an Employee or Executive who has agreed in writing o Your phones and notebooks to Your corporate mobile device acceptable use and security policy (also known as a “Bring Your Own Device” policy); 9 © 2020 HUB International Limited.
Internet Perils 10 10 © 2020 HUB International Advocacy. Tailored Limited. Insurance Solutions. Peace of Mind
Threat: Phishing Over the past month, 100,000 new domain names containing COVID, Free tests and training corona, and virus. o Google phish test: 50% are malicious https://phishingquiz.withgoogle.com/ o Trend Micro: https://phishinsight.trendmicro.com/en/ “Spoofed" websites used for phishing credentials rose by 350% since o Media Pro: https://www.mediapro.com/free- January to more than 500,000 course-stay-secure-work-from-home/ Sources: ICANN, Atlas VPN 11 © 2020 HUB International Limited.
Threat: Spam Spam email 94.9% o BEC Malicious URLs 5.0% o Malicious domains Malware 0.1% o Trojan o Ransomware Sources: TrendMicro 12 © 2020 HUB International Limited.
Ways to Protect Against Email Threats Leverage cloud-based spam filters for email Mark external email with a warning Harden the human firewall with training Stop homograph attacks with AI 13 © 2020 HUB International Limited.
Threat: Websites Sources: TrendMicro 14 © 2020 HUB International Limited.
Threat: Websites Sources: SuperUser and TrendMicro 15 © 2020 HUB International Limited.
Threat: Domain names 15% 27% March 14% 3% February 3% 4% 10% 5% 5% 8% Janaury 6% 0 5,000 10,000 15,000 20,000 25,000 30,000 35,000 40,000 United State Japan Germany France Taiwan United Kingdom Venezuela Indonesia Sources: TrendMicro India Australia Otherws 16 © 2020 HUB International Limited.
Ways to Protect Against Website Threats Filter network to block harmful websites or needless nations Users should avoid embedded links. Go directly or via search Provide links to legitimate COVID-19 resources Warn users about fake websites and campaigns 17 © 2020 HUB International Limited.
Threat: Malware Sources: Wikipedia and Heimdal Security 18 © 2020 HUB International Limited.
Threat: Malware Sources: Krebs Security 19 © 2020 HUB International Limited.
Threat: Ransomware Sources: ThreatPost and ThreatFix 20 © 2020 HUB International Limited.
Ways to Protect Against Computer Viruses Use a 3-2-1 backup strategy and use it regularly Keep all computers and software up to date and use anti-virus software Remove local administrator privileges on company-owned devices At home, never work or browse as a sysadmin. Use two accounts Remote Desktop Protocol is not a VPN. Do not access a corporate network. If you need remote access use a secure solution Managed Detection and Response (MDR) is effective against malware and ransomware. It combines tools to monitor computers with IT security experts that respond to malicious activity 21 © 2020 HUB International Limited.
Platform Perils 22 22 © 2020 HUB International Advocacy. Tailored Limited. Insurance Solutions. Peace of Mind
Threat: Remote Desktop Connections Sources: Microsoft and Avast 23 © 2020 HUB International Limited.
Threat: Applications Sources: SuperUser TrendMicro 24 © 2020 HUB International Limited.
Threat: Mobile Sources: TrendMicro 25 © 2020 HUB International Limited.
Threat: Mobile 15 84 Trojans Viruses Other Sources: Wikipedia and TrendMicro 26 © 2020 HUB International Limited.
Threat: Conferencing Bombing War Dialing Encryption Routing Tracking Vulnerabilities Sources: Various 27 © 2020 HUB International Limited.
Ways to Protect Against Various Platform Threats Educate users on where to download legitimate apps Users should only use the Google Play and iOS app store Make sure your Android device has a passcode Do not allow children to use mobiles unsupervised Consider using a mobile-device manager Never jail break a phone 28 © 2020 HUB International Limited.
Content Perils 29 29 © 2020 HUB International Advocacy. Tailored Limited. Insurance Solutions. Peace of Mind
Threat: Extortion Sources: TrendMicro 30 © 2020 HUB International Limited.
Threat: Fraud Sources: TrendMicro 31 © 2020 HUB International Limited.
Threat: Misinformation Campaigns Bioweapon Blame 5G Cell Towers Quinine Caffeine Sources: Various 32 © 2020 HUB International Limited.
Case Study: Selling Access to Your Network Approximate Translation “I don’t answer in PM, I don’t answer people in English, I don’t answer the block for people who use the translator” 33 © 2020 HUB International Limited.
Ways to Protect Against Personal Threats Never re-use passwords. Use a password manager to remember long and complex passwords or phrases Avoid watering-hole websites that infect with malware: gaming, porno, MP3 rippers, free software, free anything for that matter Harden the web browsers so that they are not so easily hijacked by javascript and consider a filtering plug-in that kills bad sites Look out for the six P’s of fraudsters: 1) Place, 2) Prescriptions, 3) Promises, 4) Price, 5) Privacy, 6) Product Double check inflammatory or “miraculous” content with experts or fact checkers. Remember: big claims require bigger evidence 34 © 2020 HUB International Limited.
Securing the Home Office 35 35 © 2020 HUB International Advocacy. Tailored Limited. Insurance Solutions. Peace of Mind
How Businesses Can Secure Data User Awareness > No longer focused on just phishing emails Change Control > Educate your users on best practices Strong Credentials Incident Identification with Multifactor Considerations IT Support for Endpoint Visibility Personal Devices 36 © 2020 HUB International Limited.
Business Data Security Checklist Passwords are weak. Use multi-factor Enhance monitoring for detection authentication of abnormal activity Issue preconfigured company laptops Train and test your workforce on and mobiles privacy, phishing, and social Equip equipment with a security suite engineering of tools Don’t rely on people. Filter mail. Back-up data using the 3-2-1 rule: Harden endpoints three copies in two with one off-site Limit VPN access and force renewed logins periodically 37 © 2020 HUB International Limited.
Business Data Security Checklist Educate employees on coronavirus Crisis and IR plans need to be scams executable by a remote workforce Make it easy for workers to check or Use remote collaboration, conference report problems and get assistance bridges, and messaging tools so a dispersed team can work and respond to problems 38 © 2020 HUB International Limited.
Employee Data Security Checklist Use company equipment; avoid home Avoid free, public Wi-Fi. Use machines enterprise VPN servers to connect to work networks If using own machines, update and patch wares. Make close as possible Where secure connectivity is doubtful, to office standards use encrypted email or encrypted file storage sites Use company security wares, follow data protection policies, avoid Change the admin passwords on your personal browsing on sensitive WiFi router. Turn on WPA encryption. machines Split the network to isolate yourself; e.g. guest net or VLAN 39 © 2020 HUB International Limited.
Employee Data Security Checklist Create two user accounts: only use Have a personal backup solution that the super-user account for installs; uses 3-2-1 work from a personal account with limited privileges Routinely scan your network to identify all connected devices Never reuse a password. Use a password manager to generate and Routinely scan your computers for store long and unique passwords malware and adware Online bank from a dedicate machine Lock down the browser against or a Linux distro javascript and malicious IP addresses Be wary of scams 40 © 2020 HUB International Limited.
Revise Company Data & Device Policies BYOD Policy for Insurance VPNs | Storage | Devices Work From Home Policy Hours | Acceptable Use | Devices | Security Business Continuity and Disaster Recovery Plans Incidence-response and Crisis Plans Done remotely? Insurance Requires Two Phone Calls Claims and Coach 41 © 2020 HUB International Limited.
Resources 1) COVID-19 Security Resource Library 2) Security for Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Solutions 3) SANS Security Awareness Guide – Securely Working at Home 4) CISA guidance for defending against COVID-19 cyber scams 5) NCSC dealing with suspicious emails and messages 6) NCSC guidance on home working 7) IAPP BYOD Policy Template 42 © 2020 HUB International Limited.
Be prepared. Know how to respond. Visit HUB’s Coronavirus Resource Center at hubinternational.com 43 © 2020 HUB International Limited.
Thank you. 44 © 2020© HUB 2020International HUB International Limited. Limited.
You can also read